Aleksandar Hudic
Aleksandar Hudic
Postgraduate Student at Vienna University of Technology
Verified email at
Cited by
Cited by
Data confidentiality using fragmentation in cloud computing
A Hudic, S Islam, P Kieseberg, S Rennert, ER Weippl
International Journal of Pervasive Computing and Communications, 2013
Security viewpoint in a reference architecture model for cyber-physical production systems
Z Ma, A Hudic, A Shaaban, S Plosz
2017 IEEE European symposium on security and privacy workshops (EuroS&PW …, 2017
Model based process to support security and privacy requirements engineering
S Islam, H Mouratidis, C Kalloniatis, A Hudic, L Zechner
International Journal of Secure Software Engineering (IJSSE) 3 (3), 1-22, 2012
Security assurance assessment methodology for hybrid clouds
A Hudic, P Smith, ER Weippl
Computers & Security 70, 723-743, 2017
Impact of critical infrastructure requirements on service migration guidelines to the cloud
C Wagner, A Hudic, S Maksuti, M Tauber, F Pallas
2015 3rd International Conference on Future Internet of Things and Cloud, 1-8, 2015
Towards a unified penetration testing taxonomy
A Hudic, L Zechner, S Islam, C Krieg, ER Weippl, S Winkler, R Hable
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
Towards continuous cloud service assurance for critical infrastructure it
A Hudic, T Hecht, M Tauber, A Mauthe, SC Elvira
2014 International Conference on Future Internet of Things and Cloud, 175-182, 2014
A multi-layer and multitenant cloud assurance evaluation methodology
A Hudic, M Tauber, T Lorünser, M Krotsiani, G Spanoudakis, A Mauthe, ...
2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014
Harmonized monitoring for high assurance clouds
A Bicaku, S Balaban, MG Tauber, A Hudic, A Mauthe, D Hutchison
2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW …, 2016
Categorization of standards, guidelines and tools for secure system design for critical infrastructure it in the cloud
S Paudel, M Tauber, C Wagner, A Hudic, WK Ng
2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014
Towards a unified secure cloud service development and deployment life-cycle
A Hudic, M Flittner, T Lorünser, PM Radl, R Bless
2016 11th International Conference on Availability, Reliability and Security …, 2016
Book review: Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
A Hudic, E Weippl
Computers and Security 31 (4), 629, 2012
Automated analysis of underground marketplaces
A Hudic, K Krombholz, T Otterbein, C Platzer, E Weippl
IFIP International Conference on Digital Forensics, 31-42, 2014
Towards resilience metrics for future cloud applications
M Novak, SNUH Shirazi, A Hudic, T Hecht, M Tauber, D Hutchison, ...
SCITEPRESS–Science and Technology Publications, 2016
A generation method of cryptographic keys for enterprise communication systems
A Hudic, E Revell, DE Simos
2013 International Conference on Availability, Reliability and Security, 406-411, 2013
Security assurance assessment for multi-layered and multi-tenant hybrid clouds
A Hudic
Wien, 2017
Lorün ser
A Hudic, M Tauber
T., Krotsiani, M., Spanoudakis, G., Mauthe, A. and Weippl, E, 2014
A Custom-classification of Communication Flow in a Client-server Model
A Hudic, E Revell, AB Kelisec, DE Simos
Eine Architektur f ur sichere Smart Grids inOsterreich
O Jung, S Fenz, M Kammerstetter, A Hudic
Beiträge in Tagungsbänden
A Jung, G Tauböck, F Hlawatsch
The system can't perform the operation now. Try again later.
Articles 1–20